Posts

Showing posts from January, 2013

MCQ of Computer Security with answer set – 2

1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse 2. Select the correct order for the different phases of virus execution. i) Propagation phase                      ii) Dormant phase iii) Execution phase                         iv) Triggering phase A) i, ii, iii, and iv B) i, iii, ii and iv C) ii, i, iv an iii D) ii, iii, iv and i 3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus 4. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Vir...

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...

Solved MCQ of Operating System Set-6

1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition management B) Memory management C) Disk management D) All of the above 2. A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a ……………. A) virtual memory, true memory B) virtual memory, real memory C) real memory, virtual memory D) imaginary memory, real memory 3. In process scheduling, …………………… determines when new processes are admitted to the system. A) long term scheduling B) medium term scheduling C) short term scheduling D) none of the above 4. In process scheduling, ………………… determines which ready process will be executed next by processor. A) long term scheduling B) medium term scheduling C) short term scheduling D) none of the above 5. The sum of the seek time, and the rotational delay is called the ……………….. A) reached time B) access time C) arrived time D) common time 6. The …………….. policy se...

Solved MCQ of Operating System Set-5

1. The unit of dispatching is usually referred to as a ………….. A) Thread B) Lightweight process C) Process D) Both A and B 2. ……………….. is a example of an operating system that support single user process and single thread. A) UNIX B) MS-DOS C) OS/2 D) Windows 2000 3. State true or false. i) Unix, support multiple user process but only support one thread per process. ii) A java run time environment is an example of a system of one process with multiple threads. A) True, False B) True, True C) False, True D) False, False 4. …………… are very effective because a mode switch is not required to switch from one thread to another. A) Kernel-level threads B) User-level threads C) Alterable threads D) Application level threads 5. …………… is a condition in which there is a set of concurrent processes, only one of which is able to access a given resource or perform a given function at any time. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation 6. …………………. Techniques can be used to resolve...

MCQ of Operating System with answer set-4

1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes. A) Synchronization B) Mutual Exclusion C) Dead lock D) Starvation 2. Which of the following is not the approach to dealing with deadlock? A) Prevention B) Avoidance C) Detection D) Deletion 3. Which of the following are the states of a five state process model? i) Running            ii) Ready               iii) New                 iv) Exit                   v) Destroy A) i, ii, iii and v only B) i, ii, iv and v only C) i, ii, iii, and iv only D) All i, ii, iii, iv and v 4. State which statement is true for Suspended process? i) The process is not immedia...

Solved MCQ of Java for Java Proficiency test set-3

1. All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window 2. The jdb is used to A) Create a jar archive B) Debug a java program C) Create C header file D) Generate java documentation 3. What would happen if "String[]args" is not included as argument in the main method. A) No error B) Compilation error C) Program won't run D) Program exit 4. For execution of DELETE SQL query in JDBC, ............. method must be used. A) executeQuery() B) executeDeleteQuery() C) executeUpdate() D) executeDelete() 5. Which method will a web browser call on a new applet? A) main method B) destroy method C) execute method D) init method 6. Which of the following is not mandatory in variable declaration? A) a semicolon B) an identifier C) an assignment D) a data type 7. When a program class implements an interface, it must provide behavior for A) two methods defined in that interface B) any methods in a class C) only certain methods in tha...

MCQ of Java with answer set-2

1. The JDBC-ODBC bridge allows ……….. to be used as ………..  A) JDBC drivers, ODBC drivers B) Drivers, Application C) ODBC drivers, JDBC drivers D) Application, drivers 2. Which of the following is true about Java. A) Java does not support overloading. B) Java has replaced the destructor function of C++ C) There are no header files in Java. D) All of the above. 3. ……………. are not machine instructions and therefore, Java interpreter generates machine code that can be directly executed by the machine that is running the Java program. A) Compiled Instructions B) Compiled code C) byte code D) Java mid code 4. The command javac A) Converts a java program into binary code B) Converts a java program into bytecode C) Converts a java program into machine language D) None of the above. 5. Which of the following is not the java primitive type A) Byte B) Float C) Character D) Long double 6. Command to execute compiled java program is A) java B) javac C) run D) javaw 7. Java Servlet i) is key compo...

Solved MCQ of Computer Networking set-5

1. Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer  2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address. A) Class A B) Class B C) Class C D) Class D 3. ............. addresses are reserved for multicasting. A) Class B B) Class C C) Class D D) Class E 4. State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False 5. Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above 6. Which is not the Regional Internet Registers (RIR) of the following? A) ...

MCQ of Database Management System with answer set-6

1. ............... joins are SQL server default A) Outer B) Inner C) Equi D) None of the above 2. The ..................... is essentially used to search for patterns in target string. A) Like Predicate B) Null Predicate C) In Predicate D) Out Predicate 3. Which of the following is/are the Database server functions? i) Data management            ii) Transaction management iii) Compile queries            iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv 4. To delete a database ................... command is used A) delete database database_name B) Delete database_name C) drop database database_name D) drop database_name 5. .............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key 6. Which of the followi...

Solved MCQ of Operating System Theory set-3

1. Which of the following is not the function of Micro kernel? A) File management B) Low-level memory management C) Inter-process communication D) I/O interrupts management 2. Match the following. i) Mutual exclusion                          a) A process may hold allocated resources while waiting assignment. ii) Hold and wait                             b) No resource can be forcibly removed from a process holding it. iii) No preemption                           c) Only one process may use a resource at a time. A) i-a, ii-b, iii-c B) i-a, ii-c, iii-b C) i-b, ii-c, iii-a D) i-c, ii-a, iii-b 3. A direct method of deadlock prevention is to prevent the occurrences of ............